Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
b0386ba950a1b343ae0b01e8c98e0a4c_JaffaCakes118.dll
Resource
win7-20240508-en
General
-
Target
b0386ba950a1b343ae0b01e8c98e0a4c_JaffaCakes118.dll
-
Size
1.4MB
-
MD5
b0386ba950a1b343ae0b01e8c98e0a4c
-
SHA1
5f2cca191a83203b55710072c5cef194bdfc7b83
-
SHA256
80945307d35592bafc62a4521f865dccdee21e442dc15d533675207d6c012614
-
SHA512
088224073d06521d9c43ecea1b493d12bb39ffa3f40db879c0b69c462a621db343cf7c03740304e063158b18d41ab747ecd99980c865068abcb8ced2125eda5c
-
SSDEEP
24576:4uYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9NP:I9cKrUqZWLAcUH
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1196-5-0x0000000002E00000-0x0000000002E01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2496 DeviceDisplayObjectProvider.exe 2072 cmstp.exe 2780 dvdupgrd.exe -
Loads dropped DLL 7 IoCs
pid Process 1196 Process not Found 2496 DeviceDisplayObjectProvider.exe 1196 Process not Found 2072 cmstp.exe 1196 Process not Found 2780 dvdupgrd.exe 1196 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tonqjizj = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\MACROM~1.COM\\support\\FLASHP~1\\sys\\20QnxtS\\cmstp.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DeviceDisplayObjectProvider.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmstp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dvdupgrd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1932 rundll32.exe 1932 rundll32.exe 1932 rundll32.exe 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found 1196 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2796 1196 Process not Found 28 PID 1196 wrote to memory of 2796 1196 Process not Found 28 PID 1196 wrote to memory of 2796 1196 Process not Found 28 PID 1196 wrote to memory of 2496 1196 Process not Found 29 PID 1196 wrote to memory of 2496 1196 Process not Found 29 PID 1196 wrote to memory of 2496 1196 Process not Found 29 PID 1196 wrote to memory of 2524 1196 Process not Found 30 PID 1196 wrote to memory of 2524 1196 Process not Found 30 PID 1196 wrote to memory of 2524 1196 Process not Found 30 PID 1196 wrote to memory of 2072 1196 Process not Found 31 PID 1196 wrote to memory of 2072 1196 Process not Found 31 PID 1196 wrote to memory of 2072 1196 Process not Found 31 PID 1196 wrote to memory of 2760 1196 Process not Found 32 PID 1196 wrote to memory of 2760 1196 Process not Found 32 PID 1196 wrote to memory of 2760 1196 Process not Found 32 PID 1196 wrote to memory of 2780 1196 Process not Found 33 PID 1196 wrote to memory of 2780 1196 Process not Found 33 PID 1196 wrote to memory of 2780 1196 Process not Found 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b0386ba950a1b343ae0b01e8c98e0a4c_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
C:\Windows\system32\DeviceDisplayObjectProvider.exeC:\Windows\system32\DeviceDisplayObjectProvider.exe1⤵PID:2796
-
C:\Users\Admin\AppData\Local\SYAcTUKBo\DeviceDisplayObjectProvider.exeC:\Users\Admin\AppData\Local\SYAcTUKBo\DeviceDisplayObjectProvider.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2496
-
C:\Windows\system32\cmstp.exeC:\Windows\system32\cmstp.exe1⤵PID:2524
-
C:\Users\Admin\AppData\Local\Nb2\cmstp.exeC:\Users\Admin\AppData\Local\Nb2\cmstp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2072
-
C:\Windows\system32\dvdupgrd.exeC:\Windows\system32\dvdupgrd.exe1⤵PID:2760
-
C:\Users\Admin\AppData\Local\6F8aweN1\dvdupgrd.exeC:\Users\Admin\AppData\Local\6F8aweN1\dvdupgrd.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5510ce1d045b3e0a36167aee9e734481d
SHA1055a563d4849305537c004b1edd806ab2120bcd2
SHA256cd47ef32260203cceb27693cc17c040c030be0e41e4a63146a4508b60f1f7468
SHA512c2a7212e97ff57473939a7624038d93b345368eab0b279f71bc173e72ae4788ecfa7843580b8d4243fd2152fc85aa0df945b140d6aac030e3fec4f8400475223
-
Filesize
25KB
MD575a9b4172eac01d9648c6d2133af952f
SHA163c7e1af762d2b584e9cc841e8b0100f2a482b81
SHA25618f9f520c7157023b0e7dfe7433a63c4dedd47b04d24aac4038b795893050736
SHA5125a7a2c7f184efd9c84256a1a0a5e7aeb95432d63a567196be54e7a9437a5ada9b922983c5fc0cafb16eab4493665d8e56e2f646f9f6a2d6179986925ffcdf769
-
Filesize
1.4MB
MD5d9b849d487efa79bd64b4a3007201c4e
SHA1c19819086bd6ad6cdcea6c09f67b5810dfbd7e41
SHA256d75174f0eda30f8e2cbd48da11954ea7a05f4237b1d5879410300f3ad22d829e
SHA512863e4fe6eb6aeae48ab58dbd04c5d8bfdb59bb0a5108bc1baafba5d6e793535587f9d8a10e595b54bf991ac9157eb734fde996d3ba680b103576aac794c4f54a
-
Filesize
1.4MB
MD50480e15546611d496626a7ec1ca5c434
SHA1f406715758013feef0e5a711b641b13df6f4f7b3
SHA2566be3be073e9e5721be067de6d830ea67b48a1b52ac2307b38c268e38841490fe
SHA512ddcdfe3d9af3d9a31ae4f070e70c8cfd0c3c74a32095d9f0fe59ea8d94fabdee55b352cb64d7f02fd1a08b554f41f293b85fcc8bf2abdcfdf3bf473dcbfd858c
-
Filesize
1000B
MD5dffd958bf2630040e02890afe4fa02cc
SHA1b96a4edc2457aac84c2ebac7f5c5f0890e779db9
SHA25688aa805fb5e305cb02e2791805f377318f5b8ac9b91af5c6c9dd533bb312f5bc
SHA5128d4130ee4c1557aa0c45d8529556904eccd9e957ef4d4775203fd79adf858e6f1b5f9bbb186d01a527f00ad07fbe0c20657a642e177b24fe49a2ba0d71247460
-
Filesize
90KB
MD574c6da5522f420c394ae34b2d3d677e3
SHA1ba135738ef1fb2f4c2c6c610be2c4e855a526668
SHA25651d298b1a8a2d00d5c608c52dba0655565d021e9798ee171d7fa92cc0de729a6
SHA512bfd76b1c3e677292748f88bf595bfef0b536eb22f2583b028cbf08f6ae4eda1aa3787c4e892aad12b7681fc2363f99250430a0e7019a7498e24db391868e787a
-
Filesize
109KB
MD57e2eb3a4ae11190ef4c8a9b9a9123234
SHA172e98687a8d28614e2131c300403c2822856e865
SHA2568481a8ec19cb656ce328c877d5817d317203ba34424a2e9d169ddce5bf2cd2b0
SHA51218b1a0637f48929972a463d441182307725ebf1410dd461a1966bd040ac5dcced138155b7c713bfc924ea2f7b39527a084a08b44fa24c3eb9c654871f99caabf